/opennms-base-assembly/src/main/filtered/etc/events/Cisco.airespace.xml

https://github.com/ajakubo1/opennms · XML · 5083 lines · 4771 code · 308 blank · 4 comment · 0 complexity · abb0a33e928325c0e78eb8a45c66bdc8 MD5 · raw file

Large files are truncated click here to view the full file

  1. <!-- Start of auto generated data from MIB: AIRESPACE-WIRELESS-MIB -->
  2. <events xmlns="http://xmlns.opennms.org/xsd/eventconf">
  3. <event>
  4. <mask>
  5. <maskelement>
  6. <mename>id</mename>
  7. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  8. </maskelement>
  9. <maskelement>
  10. <mename>generic</mename>
  11. <mevalue>6</mevalue>
  12. </maskelement>
  13. <maskelement>
  14. <mename>specific</mename>
  15. <mevalue>1</mevalue>
  16. </maskelement>
  17. </mask>
  18. <uei>uei.opennms.org/vendor/cisco/bsnDot11StationDisassociate</uei>
  19. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationDisassociate</event-label>
  20. <descr>
  21. &lt;p&gt;The disassociate notification shall be sent when the Station
  22. sends a Disassociation frame. The value of the notification
  23. shall include the MAC address of the MAC to which the
  24. Disassociation frame was sent and the reason for the
  25. disassociation&lt;/p&gt;&lt;table&gt;
  26. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  27. bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  28. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  29. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  30. bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  31. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  32. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  33. bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  34. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  35. unspecified(1)
  36. previousAuthNotValid(2)
  37. deauthenticationLeaving(3)
  38. disassociationDueToInactivity(4)
  39. disassociationAPBusy(5)
  40. class2FrameFromNonAuthStation(6)
  41. class2FrameFromNonAssStation(7)
  42. disassociationStaHasLeft(8)
  43. staReqAssociationWithoutAuth(9)
  44. missingReasonCode(99)
  45. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  46. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  47. bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  48. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  49. </descr>
  50. <logmsg dest='logndisplay'>&lt;p&gt;
  51. bsnDot11StationDisassociate trap received
  52. bsnStationAPMacAddr=%parm[#1]%
  53. bsnStationAPIfSlotId=%parm[#2]%
  54. bsnStationReasonCode=%parm[#3]%
  55. bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
  56. </logmsg>
  57. <severity>Normal</severity>
  58. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
  59. </event>
  60. <event>
  61. <mask>
  62. <maskelement>
  63. <mename>id</mename>
  64. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  65. </maskelement>
  66. <maskelement>
  67. <mename>generic</mename>
  68. <mevalue>6</mevalue>
  69. </maskelement>
  70. <maskelement>
  71. <mename>specific</mename>
  72. <mevalue>2</mevalue>
  73. </maskelement>
  74. </mask>
  75. <uei>uei.opennms.org/vendor/cisco/bsnDot11StationDeauthenticate</uei>
  76. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationDeauthenticate</event-label>
  77. <descr>
  78. &lt;p&gt;The deauthenticate notification shall be sent when the Station
  79. sends a Deauthentication frame. The value of the notification
  80. shall include the MAC address of the MAC to which the
  81. Deauthentication frame was sent and the reason for the
  82. deauthentication.&lt;/p&gt;&lt;table&gt;
  83. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  84. bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  85. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  86. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  87. bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  88. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  89. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  90. bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  91. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  92. unspecified(1)
  93. previousAuthNotValid(2)
  94. deauthenticationLeaving(3)
  95. disassociationDueToInactivity(4)
  96. disassociationAPBusy(5)
  97. class2FrameFromNonAuthStation(6)
  98. class2FrameFromNonAssStation(7)
  99. disassociationStaHasLeft(8)
  100. staReqAssociationWithoutAuth(9)
  101. missingReasonCode(99)
  102. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  103. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  104. bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  105. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  106. </descr>
  107. <logmsg dest='logndisplay'>&lt;p&gt;
  108. bsnDot11StationDeauthenticate trap received
  109. bsnStationAPMacAddr=%parm[#1]%
  110. bsnStationAPIfSlotId=%parm[#2]%
  111. bsnStationReasonCode=%parm[#3]%
  112. bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
  113. </logmsg>
  114. <severity>Normal</severity>
  115. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
  116. </event>
  117. <event>
  118. <mask>
  119. <maskelement>
  120. <mename>id</mename>
  121. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  122. </maskelement>
  123. <maskelement>
  124. <mename>generic</mename>
  125. <mevalue>6</mevalue>
  126. </maskelement>
  127. <maskelement>
  128. <mename>specific</mename>
  129. <mevalue>3</mevalue>
  130. </maskelement>
  131. </mask>
  132. <uei>uei.opennms.org/vendor/cisco/bsnDot11StationAuthenticateFail</uei>
  133. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationAuthenticateFail</event-label>
  134. <descr>
  135. &lt;p&gt;The authenticate failure notification shall be sent when the
  136. Station sends an Authentication frame with a status code other
  137. than 'successful'. The value of the notification shall include
  138. the MAC address of the MAC to which the Authentication
  139. frame was sent and the reason for the authentication failure.&lt;/p&gt;&lt;table&gt;
  140. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  141. bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  142. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  143. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  144. bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  145. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  146. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  147. bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  148. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  149. unspecified(1)
  150. previousAuthNotValid(2)
  151. deauthenticationLeaving(3)
  152. disassociationDueToInactivity(4)
  153. disassociationAPBusy(5)
  154. class2FrameFromNonAuthStation(6)
  155. class2FrameFromNonAssStation(7)
  156. disassociationStaHasLeft(8)
  157. staReqAssociationWithoutAuth(9)
  158. missingReasonCode(99)
  159. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  160. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  161. bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  162. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  163. </descr>
  164. <logmsg dest='logndisplay'>&lt;p&gt;
  165. bsnDot11StationAuthenticateFail trap received
  166. bsnStationAPMacAddr=%parm[#1]%
  167. bsnStationAPIfSlotId=%parm[#2]%
  168. bsnStationReasonCode=%parm[#3]%
  169. bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
  170. </logmsg>
  171. <severity>Warning</severity>
  172. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
  173. </event>
  174. <event>
  175. <mask>
  176. <maskelement>
  177. <mename>id</mename>
  178. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  179. </maskelement>
  180. <maskelement>
  181. <mename>generic</mename>
  182. <mevalue>6</mevalue>
  183. </maskelement>
  184. <maskelement>
  185. <mename>specific</mename>
  186. <mevalue>4</mevalue>
  187. </maskelement>
  188. </mask>
  189. <uei>uei.opennms.org/vendor/cisco/bsnDot11StationAssociateFail</uei>
  190. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationAssociateFail</event-label>
  191. <descr>
  192. &lt;p&gt;The associate failure notification shall be sent when the
  193. Station sends an Association frame with a status code other
  194. than 'successful'. The value of the notification
  195. shall include the MAC address of the MAC to which the
  196. Authentication frame was sent and the reason for the
  197. authentication failure.&lt;/p&gt;&lt;table&gt;
  198. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  199. bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  200. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  201. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  202. bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  203. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  204. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  205. bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  206. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  207. unspecified(1)
  208. previousAuthNotValid(2)
  209. deauthenticationLeaving(3)
  210. disassociationDueToInactivity(4)
  211. disassociationAPBusy(5)
  212. class2FrameFromNonAuthStation(6)
  213. class2FrameFromNonAssStation(7)
  214. disassociationStaHasLeft(8)
  215. staReqAssociationWithoutAuth(9)
  216. missingReasonCode(99)
  217. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  218. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  219. bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  220. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  221. </descr>
  222. <logmsg dest='logndisplay'>&lt;p&gt;
  223. bsnDot11StationAssociateFail trap received
  224. bsnStationAPMacAddr=%parm[#1]%
  225. bsnStationAPIfSlotId=%parm[#2]%
  226. bsnStationReasonCode=%parm[#3]%
  227. bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
  228. </logmsg>
  229. <severity>Warning</severity>
  230. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
  231. </event>
  232. <event>
  233. <mask>
  234. <maskelement>
  235. <mename>id</mename>
  236. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  237. </maskelement>
  238. <maskelement>
  239. <mename>generic</mename>
  240. <mevalue>6</mevalue>
  241. </maskelement>
  242. <maskelement>
  243. <mename>specific</mename>
  244. <mevalue>5</mevalue>
  245. </maskelement>
  246. </mask>
  247. <uei>uei.opennms.org/vendor/cisco/bsnAPUp</uei>
  248. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPUp</event-label>
  249. <descr>
  250. &lt;p&gt;When Airespace AP operation status goes up this trap will be
  251. sent&lt;/p&gt;&lt;table&gt;
  252. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  253. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  254. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  255. </descr>
  256. <logmsg dest='logndisplay'>&lt;p&gt;
  257. bsnAPUp trap received
  258. bsnAPDot3MacAddress=%parm[#1]%&lt;/p&gt;
  259. </logmsg>
  260. <severity>Normal</severity>
  261. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPDown:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
  262. </event>
  263. <event>
  264. <mask>
  265. <maskelement>
  266. <mename>id</mename>
  267. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  268. </maskelement>
  269. <maskelement>
  270. <mename>generic</mename>
  271. <mevalue>6</mevalue>
  272. </maskelement>
  273. <maskelement>
  274. <mename>specific</mename>
  275. <mevalue>6</mevalue>
  276. </maskelement>
  277. </mask>
  278. <uei>uei.opennms.org/vendor/cisco/bsnAPDown</uei>
  279. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPDown</event-label>
  280. <descr>
  281. &lt;p&gt;When Airespace AP operation status goes down this trap will be
  282. sent&lt;/p&gt;&lt;table&gt;
  283. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  284. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  285. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  286. </descr>
  287. <logmsg dest='logndisplay'>&lt;p&gt;
  288. bsnAPDown trap received
  289. bsnAPDot3MacAddress=%parm[#1]%&lt;/p&gt;
  290. </logmsg>
  291. <severity>Major</severity>
  292. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  293. </event>
  294. <event>
  295. <mask>
  296. <maskelement>
  297. <mename>id</mename>
  298. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  299. </maskelement>
  300. <maskelement>
  301. <mename>generic</mename>
  302. <mevalue>6</mevalue>
  303. </maskelement>
  304. <maskelement>
  305. <mename>specific</mename>
  306. <mevalue>7</mevalue>
  307. </maskelement>
  308. </mask>
  309. <uei>uei.opennms.org/vendor/cisco/bsnAPAssociated</uei>
  310. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPAssociated</event-label>
  311. <descr>
  312. &lt;p&gt;When Airespace AP Associates to a Airespace Switch, AP
  313. associated notification will be sent with dot3 MAC address of
  314. Airespace AP.This will help management system to discover
  315. Airespace AP and add to system.&lt;/p&gt;&lt;table&gt;
  316. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  317. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  318. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  319. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  320. bsnAPPortNumberTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  321. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  322. </descr>
  323. <logmsg dest='logndisplay'>&lt;p&gt;
  324. bsnAPAssociated trap received
  325. bsnAPMacAddrTrapVariable=%parm[#1]%
  326. bsnAPPortNumberTrapVariable=%parm[#2]%&lt;/p&gt;
  327. </logmsg>
  328. <severity>Normal</severity>
  329. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPDisassociated:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" auto-clean="false" />
  330. </event>
  331. <event>
  332. <mask>
  333. <maskelement>
  334. <mename>id</mename>
  335. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  336. </maskelement>
  337. <maskelement>
  338. <mename>generic</mename>
  339. <mevalue>6</mevalue>
  340. </maskelement>
  341. <maskelement>
  342. <mename>specific</mename>
  343. <mevalue>8</mevalue>
  344. </maskelement>
  345. </mask>
  346. <uei>uei.opennms.org/vendor/cisco/bsnAPDisassociated</uei>
  347. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPDisassociated</event-label>
  348. <descr>
  349. &lt;p&gt;When Airespace AP disassociates from Airespace Switch, AP
  350. disassociated notification will be sent with dot3 MAC address
  351. of Airespace AP management system to remove Airespace AP from
  352. this Airespace Switch&lt;/p&gt;&lt;table&gt;
  353. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  354. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  355. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  356. </descr>
  357. <logmsg dest='logndisplay'>&lt;p&gt;
  358. bsnAPDisassociated trap received
  359. bsnAPMacAddrTrapVariable=%parm[#1]%&lt;/p&gt;
  360. </logmsg>
  361. <severity>Warning</severity>
  362. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  363. </event>
  364. <event>
  365. <mask>
  366. <maskelement>
  367. <mename>id</mename>
  368. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  369. </maskelement>
  370. <maskelement>
  371. <mename>generic</mename>
  372. <mevalue>6</mevalue>
  373. </maskelement>
  374. <maskelement>
  375. <mename>specific</mename>
  376. <mevalue>9</mevalue>
  377. </maskelement>
  378. </mask>
  379. <uei>uei.opennms.org/vendor/cisco/bsnAPIfUp</uei>
  380. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPIfUp</event-label>
  381. <descr>
  382. &lt;p&gt;When Airespace AP's interface's operation status goes up this
  383. trap will be sent&lt;/p&gt;&lt;table&gt;
  384. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  385. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  386. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  387. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  388. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  389. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  390. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  391. bsnAPPortNumber&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  392. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  393. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  394. bsnAPIfUpDownCause&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  395. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  396. unknown(0)
  397. radioFailure(1)
  398. radioLowPower(2)
  399. maxRetransmission(3)
  400. echoTimeout(4)
  401. configAP(5)
  402. configRadio(6)
  403. configNetwork(7)
  404. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  405. </descr>
  406. <logmsg dest='logndisplay'>&lt;p&gt;
  407. bsnAPIfUp trap received
  408. bsnAPDot3MacAddress=%parm[#1]%
  409. bsnAPIfSlotId=%parm[#2]%
  410. bsnAPPortNumber=%parm[#3]%
  411. bsnAPIfUpDownCause=%parm[#4]%&lt;/p&gt;
  412. </logmsg>
  413. <severity>Normal</severity>
  414. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPIfDown:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
  415. </event>
  416. <event>
  417. <mask>
  418. <maskelement>
  419. <mename>id</mename>
  420. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  421. </maskelement>
  422. <maskelement>
  423. <mename>generic</mename>
  424. <mevalue>6</mevalue>
  425. </maskelement>
  426. <maskelement>
  427. <mename>specific</mename>
  428. <mevalue>10</mevalue>
  429. </maskelement>
  430. </mask>
  431. <uei>uei.opennms.org/vendor/cisco/bsnAPIfDown</uei>
  432. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPIfDown</event-label>
  433. <descr>
  434. &lt;p&gt;When Airespace AP's interface's operation status goes down
  435. this trap will be sent.&lt;/p&gt;&lt;table&gt;
  436. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  437. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  438. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  439. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  440. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  441. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  442. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  443. bsnAPAdminStatus&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  444. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  445. enable(1)
  446. disable(2)
  447. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  448. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  449. bsnAPIfAdminStatus&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  450. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  451. enable(1)
  452. disable(2)
  453. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  454. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  455. bsnAPIfUpDownCause&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  456. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  457. unknown(0)
  458. radioFailure(1)
  459. radioLowPower(2)
  460. maxRetransmission(3)
  461. echoTimeout(4)
  462. configAP(5)
  463. configRadio(6)
  464. configNetwork(7)
  465. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  466. </descr>
  467. <logmsg dest='logndisplay'>&lt;p&gt;
  468. bsnAPIfDown trap received
  469. bsnAPDot3MacAddress=%parm[#1]%
  470. bsnAPIfSlotId=%parm[#2]%
  471. bsnAPAdminStatus=%parm[#3]%
  472. bsnAPIfAdminStatus=%parm[#4]%
  473. bsnAPIfUpDownCause=%parm[#5]%&lt;/p&gt;
  474. </logmsg>
  475. <severity>Warning</severity>
  476. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
  477. </event>
  478. <event>
  479. <mask>
  480. <maskelement>
  481. <mename>id</mename>
  482. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  483. </maskelement>
  484. <maskelement>
  485. <mename>generic</mename>
  486. <mevalue>6</mevalue>
  487. </maskelement>
  488. <maskelement>
  489. <mename>specific</mename>
  490. <mevalue>11</mevalue>
  491. </maskelement>
  492. </mask>
  493. <uei>uei.opennms.org/vendor/cisco/bsnAPLoadProfileFailed</uei>
  494. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPLoadProfileFailed</event-label>
  495. <descr>
  496. &lt;p&gt;When LOAD Profile state changes from PASS to FAIL,
  497. notification will be sent with Dot3 MAC address of Airespace
  498. AP and slot ID of Airespace AP IF. This trap sending can be
  499. enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
  500. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  501. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  502. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  503. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  504. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  505. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  506. </descr>
  507. <logmsg dest='logndisplay'>&lt;p&gt;
  508. bsnAPLoadProfileFailed trap received
  509. bsnAPDot3MacAddress=%parm[#1]%
  510. bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
  511. </logmsg>
  512. <severity>Warning</severity>
  513. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  514. </event>
  515. <event>
  516. <mask>
  517. <maskelement>
  518. <mename>id</mename>
  519. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  520. </maskelement>
  521. <maskelement>
  522. <mename>generic</mename>
  523. <mevalue>6</mevalue>
  524. </maskelement>
  525. <maskelement>
  526. <mename>specific</mename>
  527. <mevalue>12</mevalue>
  528. </maskelement>
  529. </mask>
  530. <uei>uei.opennms.org/vendor/cisco/bsnAPNoiseProfileFailed</uei>
  531. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPNoiseProfileFailed</event-label>
  532. <descr>
  533. &lt;p&gt;When Noise Profile state changes from PASS to FAIL,
  534. notification will be sent with Dot3 MAC address of Airespace
  535. AP and slot ID of Airespace AP IF. This trap sending can be
  536. enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
  537. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  538. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  539. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  540. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  541. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  542. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  543. </descr>
  544. <logmsg dest='logndisplay'>&lt;p&gt;
  545. bsnAPNoiseProfileFailed trap received
  546. bsnAPDot3MacAddress=%parm[#1]%
  547. bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
  548. </logmsg>
  549. <severity>Warning</severity>
  550. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  551. </event>
  552. <event>
  553. <mask>
  554. <maskelement>
  555. <mename>id</mename>
  556. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  557. </maskelement>
  558. <maskelement>
  559. <mename>generic</mename>
  560. <mevalue>6</mevalue>
  561. </maskelement>
  562. <maskelement>
  563. <mename>specific</mename>
  564. <mevalue>13</mevalue>
  565. </maskelement>
  566. </mask>
  567. <uei>uei.opennms.org/vendor/cisco/bsnAPInterferenceProfileFailed</uei>
  568. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPInterferenceProfileFailed</event-label>
  569. <descr>
  570. &lt;p&gt;When Interference Profile state changes from PASS to FAIL,
  571. notification will be sent with Dot3 MAC address of Airespace
  572. AP and slot ID of Airespace AP IF. This trap sending can be
  573. enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
  574. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  575. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  576. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  577. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  578. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  579. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  580. </descr>
  581. <logmsg dest='logndisplay'>&lt;p&gt;
  582. bsnAPInterferenceProfileFailed trap received
  583. bsnAPDot3MacAddress=%parm[#1]%
  584. bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
  585. </logmsg>
  586. <severity>Warning</severity>
  587. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  588. </event>
  589. <event>
  590. <mask>
  591. <maskelement>
  592. <mename>id</mename>
  593. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  594. </maskelement>
  595. <maskelement>
  596. <mename>generic</mename>
  597. <mevalue>6</mevalue>
  598. </maskelement>
  599. <maskelement>
  600. <mename>specific</mename>
  601. <mevalue>14</mevalue>
  602. </maskelement>
  603. </mask>
  604. <uei>uei.opennms.org/vendor/cisco/bsnAPCoverageProfileFailed</uei>
  605. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCoverageProfileFailed</event-label>
  606. <descr>
  607. &lt;p&gt;When Coverage Profile state changes from PASS to FAIL,
  608. notification will be sent with Dot3 MAC address of Airespace
  609. AP and slot ID of Airespace AP IF. This trap sending can be
  610. enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
  611. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  612. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  613. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  614. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  615. bsnAPNameTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  616. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  617. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  618. bsnAPSlotIdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  619. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  620. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  621. bsnAPCoverageThresholdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  622. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  623. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  624. bsnAPCoverageFailedClients&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  625. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  626. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  627. bsnAPCoverageTotalClients&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  628. %parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  629. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  630. bsnClientMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  631. %parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  632. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  633. bsnClientRssi&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  634. %parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  635. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  636. bsnClientSnr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  637. %parm[#9]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  638. </descr>
  639. <logmsg dest='logndisplay'>&lt;p&gt;
  640. bsnAPCoverageProfileFailed trap received
  641. bsnAPMacAddrTrapVariable=%parm[#1]%
  642. bsnAPNameTrapVariable=%parm[#2]%
  643. bsnAPSlotIdTrapVariable=%parm[#3]%
  644. bsnAPCoverageThresholdTrapVariable=%parm[#4]%
  645. bsnAPCoverageFailedClients=%parm[#5]%
  646. bsnAPCoverageTotalClients=%parm[#6]%
  647. bsnClientMacAddr=%parm[#7]%
  648. bsnClientRssi=%parm[#8]%
  649. bsnClientSnr=%parm[#9]%&lt;/p&gt;
  650. </logmsg>
  651. <severity>Warning</severity>
  652. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
  653. </event>
  654. <event>
  655. <mask>
  656. <maskelement>
  657. <mename>id</mename>
  658. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  659. </maskelement>
  660. <maskelement>
  661. <mename>generic</mename>
  662. <mevalue>6</mevalue>
  663. </maskelement>
  664. <maskelement>
  665. <mename>specific</mename>
  666. <mevalue>15</mevalue>
  667. </maskelement>
  668. </mask>
  669. <uei>uei.opennms.org/vendor/cisco/bsnAPCurrentTxPowerChanged</uei>
  670. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCurrentTxPowerChanged</event-label>
  671. <descr>
  672. &lt;p&gt;Whenever dynamic algorithms are running and
  673. bsnAPIfPhyPowerAutomaticOn is true, Airespace AP Interface's
  674. CurrentTxPower might get updated by algorithm. When
  675. this occurs notification will be sent with Dot3 MAC address of
  676. Airespace AP and slot ID of Airespace AP IF along with the
  677. currentTxPower for this Airespace AP IF&lt;/p&gt;&lt;table&gt;
  678. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  679. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  680. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  681. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  682. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  683. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  684. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  685. bsnAPIfPhyTxPowerLevel&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  686. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  687. </descr>
  688. <logmsg dest='logndisplay'>&lt;p&gt;
  689. bsnAPCurrentTxPowerChanged trap received
  690. bsnAPDot3MacAddress=%parm[#1]%
  691. bsnAPIfSlotId=%parm[#2]%
  692. bsnAPIfPhyTxPowerLevel=%parm[#3]%&lt;/p&gt;
  693. </logmsg>
  694. <severity>Normal</severity>
  695. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  696. </event>
  697. <event>
  698. <mask>
  699. <maskelement>
  700. <mename>id</mename>
  701. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  702. </maskelement>
  703. <maskelement>
  704. <mename>generic</mename>
  705. <mevalue>6</mevalue>
  706. </maskelement>
  707. <maskelement>
  708. <mename>specific</mename>
  709. <mevalue>16</mevalue>
  710. </maskelement>
  711. </mask>
  712. <uei>uei.opennms.org/vendor/cisco/bsnAPCurrentChannelChanged</uei>
  713. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCurrentChannelChanged</event-label>
  714. <descr>
  715. &lt;p&gt;Whenever dynamic algorithms are running and
  716. bsnAPIfPhyChannelAutomaticOn is true, Airespace AP
  717. Interface's CurrentChannel might get updated by algorithm.
  718. When this occurs notification will be sent with Dot3 MAC
  719. address of Airespace AP and slot ID of Airespace AP IF along
  720. with the currentChannel for this Airespace AP IF&lt;/p&gt;&lt;table&gt;
  721. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  722. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  723. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  724. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  725. bsnAPSlotIdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  726. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  727. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  728. bsnAPChannelNumberTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  729. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  730. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  731. bsnInterferenceEnergyBeforeChannelUpdate&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  732. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  733. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  734. bsnInterferenceEnergyAfterChannelUpdate&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  735. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  736. </descr>
  737. <logmsg dest='logndisplay'>&lt;p&gt;
  738. bsnAPCurrentChannelChanged trap received
  739. bsnAPMacAddrTrapVariable=%parm[#1]%
  740. bsnAPSlotIdTrapVariable=%parm[#2]%
  741. bsnAPChannelNumberTrapVariable=%parm[#3]%
  742. bsnInterferenceEnergyBeforeChannelUpdate=%parm[#4]%
  743. bsnInterferenceEnergyAfterChannelUpdate=%parm[#5]%&lt;/p&gt;
  744. </logmsg>
  745. <severity>Normal</severity>
  746. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  747. </event>
  748. <event>
  749. <mask>
  750. <maskelement>
  751. <mename>id</mename>
  752. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  753. </maskelement>
  754. <maskelement>
  755. <mename>generic</mename>
  756. <mevalue>6</mevalue>
  757. </maskelement>
  758. <maskelement>
  759. <mename>specific</mename>
  760. <mevalue>21</mevalue>
  761. </maskelement>
  762. </mask>
  763. <uei>uei.opennms.org/vendor/cisco/bsnRrmDot11aGroupingDone</uei>
  764. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRrmDot11aGroupingDone</event-label>
  765. <descr>
  766. &lt;p&gt;When Grouping is done, this notification will be sent from the
  767. previous Group Leader where grouping algorithm was run. It has
  768. MAC address of the new Group Leader.&lt;/p&gt;&lt;table&gt;
  769. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  770. bsnRrmDot11aGroupLeaderMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  771. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  772. </descr>
  773. <logmsg dest='logndisplay'>&lt;p&gt;
  774. bsnRrmDot11aGroupingDone trap received
  775. bsnRrmDot11aGroupLeaderMacAddr=%parm[#1]%&lt;/p&gt;
  776. </logmsg>
  777. <severity>Normal</severity>
  778. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  779. </event>
  780. <event>
  781. <mask>
  782. <maskelement>
  783. <mename>id</mename>
  784. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  785. </maskelement>
  786. <maskelement>
  787. <mename>generic</mename>
  788. <mevalue>6</mevalue>
  789. </maskelement>
  790. <maskelement>
  791. <mename>specific</mename>
  792. <mevalue>22</mevalue>
  793. </maskelement>
  794. </mask>
  795. <uei>uei.opennms.org/vendor/cisco/bsnRrmDot11bGroupingDone</uei>
  796. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRrmDot11bGroupingDone</event-label>
  797. <descr>
  798. &lt;p&gt;When Grouping is done, this notification will be sent from the
  799. previous Group Leader where grouping algorithm was run. It has
  800. MAC address of the new Group Leader.&lt;/p&gt;&lt;table&gt;
  801. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  802. bsnRrmDot11bGroupLeaderMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  803. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  804. </descr>
  805. <logmsg dest='logndisplay'>&lt;p&gt;
  806. bsnRrmDot11bGroupingDone trap received
  807. bsnRrmDot11bGroupLeaderMacAddr=%parm[#1]%&lt;/p&gt;
  808. </logmsg>
  809. <severity>Normal</severity>
  810. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  811. </event>
  812. <event>
  813. <mask>
  814. <maskelement>
  815. <mename>id</mename>
  816. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  817. </maskelement>
  818. <maskelement>
  819. <mename>generic</mename>
  820. <mevalue>6</mevalue>
  821. </maskelement>
  822. <maskelement>
  823. <mename>specific</mename>
  824. <mevalue>23</mevalue>
  825. </maskelement>
  826. </mask>
  827. <uei>uei.opennms.org/vendor/cisco/bsnConfigSaved</uei>
  828. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnConfigSaved</event-label>
  829. <descr>
  830. &lt;p&gt;When configuration is save either from CLI or web interface
  831. This trap will be sent to inform NMS to do refresh&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
  832. </descr>
  833. <logmsg dest='logndisplay'>&lt;p&gt;
  834. bsnConfigSaved trap received&lt;/p&gt;
  835. </logmsg>
  836. <severity>Indeterminate</severity>
  837. </event>
  838. <event>
  839. <mask>
  840. <maskelement>
  841. <mename>id</mename>
  842. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  843. </maskelement>
  844. <maskelement>
  845. <mename>generic</mename>
  846. <mevalue>6</mevalue>
  847. </maskelement>
  848. <maskelement>
  849. <mename>specific</mename>
  850. <mevalue>24</mevalue>
  851. </maskelement>
  852. </mask>
  853. <uei>uei.opennms.org/vendor/cisco/bsnDot11EssCreated</uei>
  854. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11EssCreated</event-label>
  855. <descr>
  856. &lt;p&gt;Whenever a new Ess (WLAN) is created, this notification will
  857. be sent along with EssIndex&lt;/p&gt;&lt;table&gt;
  858. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  859. bsnDot11EssIndex&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  860. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  861. </descr>
  862. <logmsg dest='logndisplay'>&lt;p&gt;
  863. bsnDot11EssCreated trap received
  864. bsnDot11EssIndex=%parm[#1]%&lt;/p&gt;
  865. </logmsg>
  866. <severity>Normal</severity>
  867. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  868. </event>
  869. <event>
  870. <mask>
  871. <maskelement>
  872. <mename>id</mename>
  873. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  874. </maskelement>
  875. <maskelement>
  876. <mename>generic</mename>
  877. <mevalue>6</mevalue>
  878. </maskelement>
  879. <maskelement>
  880. <mename>specific</mename>
  881. <mevalue>25</mevalue>
  882. </maskelement>
  883. </mask>
  884. <uei>uei.opennms.org/vendor/cisco/bsnDot11EssDeleted</uei>
  885. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11EssDeleted</event-label>
  886. <descr>
  887. &lt;p&gt;Whenever a Ess (WLAN)is deleted, this notification will be
  888. sent along with EssIndex&lt;/p&gt;&lt;table&gt;
  889. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  890. bsnDot11EssIndex&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  891. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  892. </descr>
  893. <logmsg dest='logndisplay'>&lt;p&gt;
  894. bsnDot11EssDeleted trap received
  895. bsnDot11EssIndex=%parm[#1]%&lt;/p&gt;
  896. </logmsg>
  897. <severity>Warning</severity>
  898. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  899. </event>
  900. <event>
  901. <mask>
  902. <maskelement>
  903. <mename>id</mename>
  904. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  905. </maskelement>
  906. <maskelement>
  907. <mename>generic</mename>
  908. <mevalue>6</mevalue>
  909. </maskelement>
  910. <maskelement>
  911. <mename>specific</mename>
  912. <mevalue>26</mevalue>
  913. </maskelement>
  914. </mask>
  915. <uei>uei.opennms.org/vendor/cisco/bsnRADIUSServerNotResponding</uei>
  916. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRADIUSServerNotResponding</event-label>
  917. <descr>
  918. &lt;p&gt;This trap is to indicate that no RADIUS server(s) are responding
  919. to authentication requests sent by the RADIUS client within the
  920. MWAR device(Switch).&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
  921. </descr>
  922. <logmsg dest='logndisplay'>&lt;p&gt;
  923. bsnRADIUSServerNotResponding trap received&lt;/p&gt;
  924. </logmsg>
  925. <severity>Minor</severity>
  926. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  927. </event>
  928. <event>
  929. <mask>
  930. <maskelement>
  931. <mename>id</mename>
  932. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  933. </maskelement>
  934. <maskelement>
  935. <mename>generic</mename>
  936. <mevalue>6</mevalue>
  937. </maskelement>
  938. <maskelement>
  939. <mename>specific</mename>
  940. <mevalue>27</mevalue>
  941. </maskelement>
  942. <varbind>
  943. <vbnumber>1</vbnumber>
  944. <vbvalue>1</vbvalue>
  945. </varbind>
  946. </mask>
  947. <uei>uei.opennms.org/vendor/cisco/bsnAuthenticationFailureMgmt</uei>
  948. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAuthenticationFailure</event-label>
  949. <descr>
  950. &lt;p&gt;This trap is to inform that client authentication failure has
  951. occured at MWAR(Switch). This could be cli/web user, wlan user,
  952. or Mac Authorized user. ServiceType will indicate which type of
  953. user it is and userName will be cli/web/wlan userName or
  954. MacAddress of Mac Authorized User&lt;/p&gt;&lt;table&gt;
  955. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  956. bsnAuthFailureUserType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  957. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  958. mgmtUser(1)
  959. wlanUser(2)
  960. macFilter(3)
  961. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  962. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  963. bsnAuthFailureUserName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  964. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  965. </descr>
  966. <logmsg dest='logndisplay'>&lt;p&gt;
  967. bsnAuthenticationFailure trap received
  968. bsnAuthFailureUserType=%parm[#1]%
  969. bsnAuthFailureUserName=%parm[#2]%&lt;/p&gt;
  970. </logmsg>
  971. <severity>Warning</severity>
  972. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  973. </event>
  974. <event>
  975. <mask>
  976. <maskelement>
  977. <mename>id</mename>
  978. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  979. </maskelement>
  980. <maskelement>
  981. <mename>generic</mename>
  982. <mevalue>6</mevalue>
  983. </maskelement>
  984. <maskelement>
  985. <mename>specific</mename>
  986. <mevalue>27</mevalue>
  987. </maskelement>
  988. </mask>
  989. <uei>uei.opennms.org/vendor/cisco/bsnAuthenticationFailure</uei>
  990. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAuthenticationFailure</event-label>
  991. <descr>
  992. &lt;p&gt;This trap is to inform that client authentication failure has
  993. occured at MWAR(Switch). This could be cli/web user, wlan user,
  994. or Mac Authorized user. ServiceType will indicate which type of
  995. user it is and userName will be cli/web/wlan userName or
  996. MacAddress of Mac Authorized User&lt;/p&gt;&lt;table&gt;
  997. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  998. bsnAuthFailureUserType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  999. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  1000. mgmtUser(1)
  1001. wlanUser(2)
  1002. macFilter(3)
  1003. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1004. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1005. bsnAuthFailureUserName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1006. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1007. </descr>
  1008. <logmsg dest='logndisplay'>&lt;p&gt;
  1009. bsnAuthenticationFailure trap received
  1010. bsnAuthFailureUserType=%parm[#1]%
  1011. bsnAuthFailureUserName=%parm[#2]%&lt;/p&gt;
  1012. </logmsg>
  1013. <severity>Normal</severity>
  1014. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1015. </event>
  1016. <event>
  1017. <mask>
  1018. <maskelement>
  1019. <mename>id</mename>
  1020. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1021. </maskelement>
  1022. <maskelement>
  1023. <mename>generic</mename>
  1024. <mevalue>6</mevalue>
  1025. </maskelement>
  1026. <maskelement>
  1027. <mename>specific</mename>
  1028. <mevalue>28</mevalue>
  1029. </maskelement>
  1030. </mask>
  1031. <uei>uei.opennms.org/vendor/cisco/bsnIpsecEspAuthFailureTrap</uei>
  1032. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecEspAuthFailureTrap</event-label>
  1033. <descr>
  1034. &lt;p&gt;IPsec packets with invalid hashes were found in an inbound
  1035. ESP SA. The total number of authentication errors
  1036. accumulated is sent for the specific row of the
  1037. ipsecSaEspInTable table for the SA; this provides the
  1038. identity of the SA in which the error occurred.
  1039. Implementations SHOULD send one trap per SA (within a
  1040. reasonable time period), rather than sending one trap per
  1041. packet.&lt;/p&gt;&lt;table&gt;
  1042. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1043. bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1044. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1045. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1046. bsnIpsecErrorCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1047. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1048. </descr>
  1049. <logmsg dest='logndisplay'>&lt;p&gt;
  1050. bsnIpsecEspAuthFailureTrap trap received
  1051. bsnRemoteIPv4Address=%parm[#1]%
  1052. bsnIpsecErrorCount=%parm[#2]%&lt;/p&gt;
  1053. </logmsg>
  1054. <severity>Normal</severity>
  1055. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1056. </event>
  1057. <event>
  1058. <mask>
  1059. <maskelement>
  1060. <mename>id</mename>
  1061. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1062. </maskelement>
  1063. <maskelement>
  1064. <mename>generic</mename>
  1065. <mevalue>6</mevalue>
  1066. </maskelement>
  1067. <maskelement>
  1068. <mename>specific</mename>
  1069. <mevalue>29</mevalue>
  1070. </maskelement>
  1071. </mask>
  1072. <uei>uei.opennms.org/vendor/cisco/bsnIpsecEspReplayFailureTrap</uei>
  1073. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecEspReplayFailureTrap</event-label>
  1074. <descr>
  1075. &lt;p&gt;IPsec packets with invalid sequence numbers were found in
  1076. an inbound ESP SA. The total number of replay errors
  1077. accumulated is sent for the specific row of the
  1078. ipsecSaEspInTable table for the SA; this provides the
  1079. identity of the SA in which the error occurred.
  1080. Implementations SHOULD send one trap per SA (within a
  1081. reasonable time period), rather than sending one trap per
  1082. packet.&lt;/p&gt;&lt;table&gt;
  1083. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1084. bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1085. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1086. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1087. bsnIpsecErrorCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1088. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1089. </descr>
  1090. <logmsg dest='logndisplay'>&lt;p&gt;
  1091. bsnIpsecEspReplayFailureTrap trap received
  1092. bsnRemoteIPv4Address=%parm[#1]%
  1093. bsnIpsecErrorCount=%parm[#2]%&lt;/p&gt;
  1094. </logmsg>
  1095. <severity>Warning</severity>
  1096. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  1097. </event>
  1098. <event>
  1099. <mask>
  1100. <maskelement>
  1101. <mename>id</mename>
  1102. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1103. </maskelement>
  1104. <maskelement>
  1105. <mename>generic</mename>
  1106. <mevalue>6</mevalue>
  1107. </maskelement>
  1108. <maskelement>
  1109. <mename>specific</mename>
  1110. <mevalue>31</mevalue>
  1111. </maskelement>
  1112. </mask>
  1113. <uei>uei.opennms.org/vendor/cisco/bsnIpsecEspInvalidSpiTrap</uei>
  1114. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecEspInvalidSpiTrap</event-label>
  1115. <descr>
  1116. &lt;p&gt;A packet with an unknown SPI was detected from the
  1117. specified peer with the specified SPI using the specified
  1118. protocol. The destination address of the received packet is
  1119. specified by ipsecLocalAddress.
  1120. The value ifIndex may be 0 if this optional linkage is
  1121. unsupported.
  1122. If the object ipsecSecurityProtocol has the value for
  1123. IPcomp, then the ipsecSPI object is the CPI of the packet.
  1124. Implementations SHOULD send one trap per peer (within a
  1125. reasonable time period), rather than sending one trap per
  1126. packet.&lt;/p&gt;&lt;table&gt;
  1127. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1128. bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1129. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1130. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1131. bsnIpsecSPI&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1132. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1133. </descr>
  1134. <logmsg dest='logndisplay'>&lt;p&gt;
  1135. bsnIpsecEspInvalidSpiTrap trap received
  1136. bsnRemoteIPv4Address=%parm[#1]%
  1137. bsnIpsecSPI=%parm[#2]%&lt;/p&gt;
  1138. </logmsg>
  1139. <severity>Normal</severity>
  1140. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1141. </event>
  1142. <event>
  1143. <mask>
  1144. <maskelement>
  1145. <mename>id</mename>
  1146. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1147. </maskelement>
  1148. <maskelement>
  1149. <mename>generic</mename>
  1150. <mevalue>6</mevalue>
  1151. </maskelement>
  1152. <maskelement>
  1153. <mename>specific</mename>
  1154. <mevalue>33</mevalue>
  1155. </maskelement>
  1156. </mask>
  1157. <uei>uei.opennms.org/vendor/cisco/bsnIpsecIkeNegFailure</uei>
  1158. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecIkeNegFailure</event-label>
  1159. <descr>
  1160. &lt;p&gt;An attempt to negotiate a phase 1 IKE SA failed.
  1161. The notification counts are also sent as part of the trap,
  1162. along with the current value of the total negotiation error
  1163. counters for ISAKMP.&lt;/p&gt;&lt;table&gt;
  1164. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1165. bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1166. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1167. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1168. bsnRemoteUdpPort&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1169. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1170. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1171. bsnIkeAuthMethod&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1172. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1173. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1174. bsnIkeTotalInitFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1175. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1176. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1177. bsnIkeTotalInitNoResponses&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1178. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1179. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1180. bsnIkeTotalRespFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1181. %parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1182. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1183. bsnNotifiesSent&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1184. %parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1185. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1186. bsnNotifiesReceived&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1187. %parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1188. </descr>
  1189. <logmsg dest='logndisplay'>&lt;p&gt;
  1190. bsnIpsecIkeNegFailure trap received
  1191. bsnRemoteIPv4Address=%parm[#1]%
  1192. bsnRemoteUdpPort=%parm[#2]%
  1193. bsnIkeAuthMethod=%parm[#3]%
  1194. bsnIkeTotalInitFailures=%parm[#4]%
  1195. bsnIkeTotalInitNoResponses=%parm[#5]%
  1196. bsnIkeTotalRespFailures=%parm[#6]%
  1197. bsnNotifiesSent=%parm[#7]%
  1198. bsnNotifiesReceived=%parm[#8]%&lt;/p&gt;
  1199. </logmsg>
  1200. <severity>Normal</severity>
  1201. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1202. </event>
  1203. <event>
  1204. <mask>
  1205. <maskelement>
  1206. <mename>id</mename>
  1207. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1208. </maskelement>
  1209. <maskelement>
  1210. <mename>generic</mename>
  1211. <mevalue>6</mevalue>
  1212. </maskelement>
  1213. <maskelement>
  1214. <mename>specific</mename>
  1215. <mevalue>34</mevalue>
  1216. </maskelement>
  1217. </mask>
  1218. <uei>uei.opennms.org/vendor/cisco/bsnIpsecSuiteNegFailure</uei>
  1219. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecSuiteNegFailure</event-label>
  1220. <descr>
  1221. &lt;p&gt;An attempt to negotiate a phase 2 SA suite for the
  1222. specified selector failed.
  1223. The current total failure counts are passed as well as the
  1224. notification type counts for the notify involved in the
  1225. failure.&lt;/p&gt;&lt;table&gt;
  1226. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1227. bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1228. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1229. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1230. bsnSuiteInitFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1231. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1232. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1233. bsnSuiteRespondFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1234. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1235. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1236. bsnNotifiesSent&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1237. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1238. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1239. bsnNotifiesReceived&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1240. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1241. </descr>
  1242. <logmsg dest='logndisplay'>&lt;p&gt;
  1243. bsnIpsecSuiteNegFailure trap received
  1244. bsnRemoteIPv4Address=%parm[#1]%
  1245. bsnSuiteInitFailures=%parm[#2]%
  1246. bsnSuiteRespondFailures=%parm[#3]%
  1247. bsnNotifiesSent=%parm[#4]%
  1248. bsnNotifiesReceived=%parm[#5]%&lt;/p&gt;
  1249. </logmsg>
  1250. <severity>Normal</severity>
  1251. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1252. </event>
  1253. <event>
  1254. <mask>
  1255. <maskelement>
  1256. <mename>id</mename>
  1257. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1258. </maskelement>
  1259. <maskelement>
  1260. <mename>generic</mename>
  1261. <mevalue>6</mevalue>
  1262. </maskelement>
  1263. <maskelement>
  1264. <mename>specific</mename>
  1265. <mevalue>35</mevalue>
  1266. </maskelement>
  1267. </mask>
  1268. <uei>uei.opennms.org/vendor/cisco/bsnIpsecInvalidCookieTrap</uei>
  1269. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecInvalidCookieTrap</event-label>
  1270. <descr>
  1271. &lt;p&gt;ISAKMP packets with invalid cookies were detected from the
  1272. specified source, intended for the specified destination.
  1273. The initiator and responder cookies are also sent with the
  1274. trap.
  1275. The current count is sent to allow the trap to accurately
  1276. relfect dropped and throttled traps.
  1277. Implementations SHOULD send one trap per peer (within a
  1278. reasonable time period, rather than sending one trap per
  1279. packet.&lt;/p&gt;&lt;table&gt;
  1280. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1281. bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1282. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1283. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1284. bsnRemoteUdpPort&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1285. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1286. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1287. bsnInitiatorCookie&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1288. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1289. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1290. bsnResponderCookie&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1291. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1292. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1293. bsnIsakmpInvalidCookies&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1294. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1295. </descr>
  1296. <logmsg dest='logndisplay'>&lt;p&gt;
  1297. bsnIpsecInvalidCookieTrap trap received
  1298. bsnRemoteIPv4Address=%parm[#1]%
  1299. bsnRemoteUdpPort=%parm[#2]%
  1300. bsnInitiatorCookie=%parm[#3]%
  1301. bsnResponderCookie=%parm[#4]%
  1302. bsnIsakmpInvalidCookies=%parm[#5]%&lt;/p&gt;
  1303. </logmsg>
  1304. <severity>Normal</severity>
  1305. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1306. </event>
  1307. <event>
  1308. <mask>
  1309. <maskelement>
  1310. <mename>id</mename>
  1311. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1312. </maskelement>
  1313. <maskelement>
  1314. <mename>generic</mename>
  1315. <mevalue>6</mevalue>
  1316. </maskelement>
  1317. <maskelement>
  1318. <mename>specific</mename>
  1319. <mevalue>36</mevalue>
  1320. </maskelement>
  1321. </mask>
  1322. <uei>uei.opennms.org/vendor/cisco/bsnRogueAPDetected</uei>
  1323. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueAPDetected</event-label>
  1324. <descr>
  1325. &lt;p&gt;When a Rogue AP is detected this Trap will be sent out along
  1326. with APMacAddress on which its detected&lt;/p&gt;&lt;table&gt;
  1327. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1328. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1329. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1330. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1331. bsnRogueAPAirespaceAPMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1332. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1333. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1334. bsnRogueAPAirespaceAPSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1335. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1336. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1337. bsnRogueAPSsid&lt;/b&gt;&lt;/td&gt;&